General

  • Target

    6ac50cf9e87ed8d47f14e09ba842fc2c_cryptolocker_JC.exe

  • Size

    84KB

  • MD5

    6ac50cf9e87ed8d47f14e09ba842fc2c

  • SHA1

    bf39aa712bf2ea241bb6489e66da44660f4e10d8

  • SHA256

    95126e160ad99bde237c1f3bf863d09a9cae498e0091f31a044362997fb3213c

  • SHA512

    51220623d1c06988faa1f2290c8ee3ddf6abb9263658d7626675c1c22a5b59c3045c13f1dc20b8bc897c20e403e0dbdbd86990d4d5daf76ac9adb22afaf083e8

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalDSnUC9m:1nK6a+qdOOtEvwDpjG

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6ac50cf9e87ed8d47f14e09ba842fc2c_cryptolocker_JC.exe
    .exe windows x86


    Headers

    Sections